Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    119s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/03/2023, 13:20

General

  • Target

    64ce0304810486b7d2f391428c580c0eb9ca074a3387296b405863f2f64ab6d2.exe

  • Size

    1.1MB

  • MD5

    4d81a301de40667306e577c7f032deef

  • SHA1

    550d9c022353e88e613aaf7d3bc7a378894ab225

  • SHA256

    64ce0304810486b7d2f391428c580c0eb9ca074a3387296b405863f2f64ab6d2

  • SHA512

    2985b74930d0cb409fd972a6fa1cdff6e53b531fe6efe4104132cb21ed9359ba1b527b7f00fc12ccf18fc9f4e40576d47d4ea964e29383c081b404e2f8a3a25c

  • SSDEEP

    24576:aOBGpGXA82uYna+yTt+PVs8nRyzYBH7eNIU3yPRIdGUT:fi38nptkVnnRyqbeNI8CW

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

vina

C2

193.233.20.28:4125

Attributes
  • auth_value

    7e90e85c9cea0965a2bfd23e1cfc6bc8

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64ce0304810486b7d2f391428c580c0eb9ca074a3387296b405863f2f64ab6d2.exe
    "C:\Users\Admin\AppData\Local\Temp\64ce0304810486b7d2f391428c580c0eb9ca074a3387296b405863f2f64ab6d2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4742.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4742.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7857.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7857.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4224
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino2946.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino2946.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3036
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2523.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2523.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:8
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con2842.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con2842.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3900
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ddU26s48.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ddU26s48.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en433301.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en433301.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge323637.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge323637.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4852
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:5048
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4892
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4884
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4788
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:524
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:508
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:536
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:3932
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4568
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:3348

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge323637.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge323637.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4742.exe

                Filesize

                818KB

                MD5

                88fede33317772b9eb7d5229a3180d55

                SHA1

                3109383642e200dc03278dbc82b68647c91ec1ae

                SHA256

                6ad3528cb97c539c7fdf5f6347626819e14ad86d9e279597a10744889fdf7a9a

                SHA512

                c2e8bf435a4347d3d23dcdc3cd5b466a2a3a85142d61a7506d03e242a63a996782339b945570ea94175160e1a2daf0c2c635cf0770999df9265c33bf7f18ccf1

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4742.exe

                Filesize

                818KB

                MD5

                88fede33317772b9eb7d5229a3180d55

                SHA1

                3109383642e200dc03278dbc82b68647c91ec1ae

                SHA256

                6ad3528cb97c539c7fdf5f6347626819e14ad86d9e279597a10744889fdf7a9a

                SHA512

                c2e8bf435a4347d3d23dcdc3cd5b466a2a3a85142d61a7506d03e242a63a996782339b945570ea94175160e1a2daf0c2c635cf0770999df9265c33bf7f18ccf1

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en433301.exe

                Filesize

                175KB

                MD5

                9796505f0e48281006d920d7c01dfe7b

                SHA1

                409d6a3760f682cc6e10c4f63e16755081d1342e

                SHA256

                acf7be67bc04fc3b5f30c386ad0425b3fdbd7350dee6f7ab8b200b2bd9509479

                SHA512

                c0ab3a9eb70564d04500a0e53e429925afdf0268e015ec1ec515ed2e7c9416273be51c9f86cbf99fa1a5ccd6e6f6f5a62fadc6e256fd7a53295295e4008f5d72

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en433301.exe

                Filesize

                175KB

                MD5

                9796505f0e48281006d920d7c01dfe7b

                SHA1

                409d6a3760f682cc6e10c4f63e16755081d1342e

                SHA256

                acf7be67bc04fc3b5f30c386ad0425b3fdbd7350dee6f7ab8b200b2bd9509479

                SHA512

                c0ab3a9eb70564d04500a0e53e429925afdf0268e015ec1ec515ed2e7c9416273be51c9f86cbf99fa1a5ccd6e6f6f5a62fadc6e256fd7a53295295e4008f5d72

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7857.exe

                Filesize

                676KB

                MD5

                0bfa9982a45695a9c3f652ef3dbe8e24

                SHA1

                ea90016a98794acdd0b24d7c578c2a9a271dd616

                SHA256

                f721642e35ca045b8ebc77accb25fe254c78bd5042967e660afd201b52fcdbc6

                SHA512

                ad3523f22ef0802e7bc35b83150d3f654c0fa11a7ad76260cd689d3bbf7d12896eac0f93bf5a2cf4fa0a2dc89f5b2926438a5d0fa0d60948eb802e3da43e354c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7857.exe

                Filesize

                676KB

                MD5

                0bfa9982a45695a9c3f652ef3dbe8e24

                SHA1

                ea90016a98794acdd0b24d7c578c2a9a271dd616

                SHA256

                f721642e35ca045b8ebc77accb25fe254c78bd5042967e660afd201b52fcdbc6

                SHA512

                ad3523f22ef0802e7bc35b83150d3f654c0fa11a7ad76260cd689d3bbf7d12896eac0f93bf5a2cf4fa0a2dc89f5b2926438a5d0fa0d60948eb802e3da43e354c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ddU26s48.exe

                Filesize

                382KB

                MD5

                1ccd86565fec723397e1afc8af0808f7

                SHA1

                35965892b9e671c8476931922bcb6120fd8cf1a5

                SHA256

                2bd1192fb309534b87f03b0b67aa0c44f71912dd25a973d56ccfb4258521120b

                SHA512

                449d3219d04653914c081df55a7bfd3ccbf1591e10346ca28173e31ffdc8fbe077327d47835c7d9f5fda390a3d0d6234822aded8afd5ecd8e2effb5d756f73de

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ddU26s48.exe

                Filesize

                382KB

                MD5

                1ccd86565fec723397e1afc8af0808f7

                SHA1

                35965892b9e671c8476931922bcb6120fd8cf1a5

                SHA256

                2bd1192fb309534b87f03b0b67aa0c44f71912dd25a973d56ccfb4258521120b

                SHA512

                449d3219d04653914c081df55a7bfd3ccbf1591e10346ca28173e31ffdc8fbe077327d47835c7d9f5fda390a3d0d6234822aded8afd5ecd8e2effb5d756f73de

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino2946.exe

                Filesize

                335KB

                MD5

                fb8ffc40b8218ccf02e6a9ee42c58a6c

                SHA1

                65604ab4b6010f4edd064e8239ee092925f7b6fe

                SHA256

                6c5de2cc2f1e8031f3197d4b6a19db16bd272a49ee266170a33f89e0ff5fc4de

                SHA512

                9b4fb07d54d150312f7440aa4dc117f9d226281cd7e8881c48843a7cc2967127a516638f162999b121d309c3ed76e929aeb89079b75a987a03d4269f17ab7500

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino2946.exe

                Filesize

                335KB

                MD5

                fb8ffc40b8218ccf02e6a9ee42c58a6c

                SHA1

                65604ab4b6010f4edd064e8239ee092925f7b6fe

                SHA256

                6c5de2cc2f1e8031f3197d4b6a19db16bd272a49ee266170a33f89e0ff5fc4de

                SHA512

                9b4fb07d54d150312f7440aa4dc117f9d226281cd7e8881c48843a7cc2967127a516638f162999b121d309c3ed76e929aeb89079b75a987a03d4269f17ab7500

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2523.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2523.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con2842.exe

                Filesize

                325KB

                MD5

                9f12a3d325a792df26eb6af8c42d96ba

                SHA1

                12fb29c9c0d5aad9e2c8539044cf94915b0222b0

                SHA256

                655de0140a87b45ff417a6da6da6a53fab48e3c867d7cb907e18661b68b3630e

                SHA512

                1755de55162742fe2f90b9d3d09a72078e370bd0f7ed183a4a2cd06e41bf7af9ac50a4648fca84a5471e356a71aca2502ed1314fb74ca422701fca3d5ba4d519

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con2842.exe

                Filesize

                325KB

                MD5

                9f12a3d325a792df26eb6af8c42d96ba

                SHA1

                12fb29c9c0d5aad9e2c8539044cf94915b0222b0

                SHA256

                655de0140a87b45ff417a6da6da6a53fab48e3c867d7cb907e18661b68b3630e

                SHA512

                1755de55162742fe2f90b9d3d09a72078e370bd0f7ed183a4a2cd06e41bf7af9ac50a4648fca84a5471e356a71aca2502ed1314fb74ca422701fca3d5ba4d519

              • memory/8-152-0x0000000000270000-0x000000000027A000-memory.dmp

                Filesize

                40KB

              • memory/3900-177-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-197-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                Filesize

                64KB

              • memory/3900-173-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-175-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-169-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-179-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-181-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-183-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-185-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-187-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-189-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-191-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-193-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-195-0x0000000000400000-0x00000000004D4000-memory.dmp

                Filesize

                848KB

              • memory/3900-196-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                Filesize

                64KB

              • memory/3900-171-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-198-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                Filesize

                64KB

              • memory/3900-200-0x0000000000400000-0x00000000004D4000-memory.dmp

                Filesize

                848KB

              • memory/3900-159-0x0000000002370000-0x000000000238A000-memory.dmp

                Filesize

                104KB

              • memory/3900-160-0x0000000004BA0000-0x000000000509E000-memory.dmp

                Filesize

                5.0MB

              • memory/3900-167-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-166-0x0000000004A00000-0x0000000004A12000-memory.dmp

                Filesize

                72KB

              • memory/3900-165-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                Filesize

                64KB

              • memory/3900-164-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                Filesize

                64KB

              • memory/3900-163-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                Filesize

                64KB

              • memory/3900-162-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/3900-161-0x0000000004A00000-0x0000000004A18000-memory.dmp

                Filesize

                96KB

              • memory/4080-153-0x0000000000400000-0x00000000005A9000-memory.dmp

                Filesize

                1.7MB

              • memory/4080-127-0x0000000004400000-0x00000000044FC000-memory.dmp

                Filesize

                1008KB

              • memory/4372-1141-0x0000000002BC0000-0x0000000002BD0000-memory.dmp

                Filesize

                64KB

              • memory/4372-1140-0x0000000005100000-0x000000000514B000-memory.dmp

                Filesize

                300KB

              • memory/4372-1139-0x00000000007C0000-0x00000000007F2000-memory.dmp

                Filesize

                200KB

              • memory/4464-210-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-228-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-230-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-232-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-234-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-236-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-238-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-394-0x00000000005C0000-0x000000000060B000-memory.dmp

                Filesize

                300KB

              • memory/4464-395-0x0000000000720000-0x0000000000730000-memory.dmp

                Filesize

                64KB

              • memory/4464-398-0x0000000000720000-0x0000000000730000-memory.dmp

                Filesize

                64KB

              • memory/4464-399-0x0000000000720000-0x0000000000730000-memory.dmp

                Filesize

                64KB

              • memory/4464-1117-0x0000000005110000-0x0000000005716000-memory.dmp

                Filesize

                6.0MB

              • memory/4464-1118-0x0000000005720000-0x000000000582A000-memory.dmp

                Filesize

                1.0MB

              • memory/4464-1119-0x0000000002660000-0x0000000002672000-memory.dmp

                Filesize

                72KB

              • memory/4464-1120-0x0000000002680000-0x00000000026BE000-memory.dmp

                Filesize

                248KB

              • memory/4464-1121-0x0000000005940000-0x000000000598B000-memory.dmp

                Filesize

                300KB

              • memory/4464-1122-0x0000000000720000-0x0000000000730000-memory.dmp

                Filesize

                64KB

              • memory/4464-1124-0x0000000005AD0000-0x0000000005B62000-memory.dmp

                Filesize

                584KB

              • memory/4464-1125-0x0000000005B70000-0x0000000005BD6000-memory.dmp

                Filesize

                408KB

              • memory/4464-1127-0x0000000000720000-0x0000000000730000-memory.dmp

                Filesize

                64KB

              • memory/4464-1128-0x0000000000720000-0x0000000000730000-memory.dmp

                Filesize

                64KB

              • memory/4464-1129-0x0000000000720000-0x0000000000730000-memory.dmp

                Filesize

                64KB

              • memory/4464-1130-0x00000000020A0000-0x0000000002116000-memory.dmp

                Filesize

                472KB

              • memory/4464-1131-0x0000000007620000-0x0000000007670000-memory.dmp

                Filesize

                320KB

              • memory/4464-1132-0x0000000007670000-0x0000000007832000-memory.dmp

                Filesize

                1.8MB

              • memory/4464-1133-0x0000000007840000-0x0000000007D6C000-memory.dmp

                Filesize

                5.2MB

              • memory/4464-226-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-224-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-222-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-220-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-218-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-216-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-214-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-212-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-207-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-208-0x00000000023A0000-0x00000000023DE000-memory.dmp

                Filesize

                248KB

              • memory/4464-206-0x00000000023A0000-0x00000000023E4000-memory.dmp

                Filesize

                272KB

              • memory/4464-205-0x00000000022B0000-0x00000000022F6000-memory.dmp

                Filesize

                280KB